LogoLogo
Back to All
  • TNG Identity user documentation
  • 📑INTRODUCTION
    • Introduction to TNG Identity
    • Why choose TNG Identity?
      • DID differentiators
    • How does TNG Identity work?
      • Data flows
      • Use cases and applications
    • Standards and regulations
    • Portal API
      • Overview
      • Getting Started
      • API Documentation
        • App
        • Auth
        • Mail
        • Organisation Profiles
        • User Profiles
        • PSP > Product Manager > Customer User Api Key
        • PSP > Product Manager > User Manager
  • 📄TNG Identity Issuers
    • What is an issuer?
    • How to become an issuer?
    • Operating an issuer
    • What do issuers do?
    • Issuer API
      • Overview
      • Getting Started
      • Examples
        • Issue an email credential
        • Revoke a claimed email credential
      • API Documentation
        • Info
        • Auth
        • Media
        • Credential Offer Claims
        • Credential Offer Collections
        • Credential Offers
        • Credential Templates
        • Claim
        • Agent
  • 📑TNG IDENTITY VERIFIER
    • What is a Verifier?
    • Operating a verifier
    • How to become a verifier?
    • Verifier API
      • Overview
      • Getting Started
      • Examples
        • Verify an email credential
      • API Documentation
        • Info
        • Auth
        • Verifiable Presentation
        • Agent
        • SIOP
        • Templates
  • 📄TNG IDENTITY WALLET
    • What is the wallet for?
    • How to receive a Verifiable Credential?
    • How to share a Verifiable Credential?
  • 📑Privacy and Security
    • Privacy and Security Measures: TNG Identity Services
    • Revocation and data deletion
  • 🗃️SELF-SOVEREIGN IDENTITY KNOWLEDGE
    • Self-Sovereign Identity
    • Actors
    • Decentralized vs Self-Sovereign Identity
    • Key Principles of Self-Sovereign Identity
    • Self-Sovereign Identity – Use Cases
    • Digital Trust
    • Some of the critical components of Self Sovereign Identity
      • Trust over IP
    • Some of the critical components of Decentralise ID
      • A Blockchain Tailored for Decentralized Identity
      • Decentralise Identifiers (DID)
      • Verifiable Credentials
      • Verifiable Presentations
  • 📑GLOSSARY
    • Glossary
  • 📄FAQs / HELP
    • Help & FAQs
      • What is a digital identity?
      • What is TNG Identity, and how does it work?
      • How is blockchain used in TNG Identity?
      • Compatible Blockchains for TNG Identity.
      • How can my business sign up for TNG Identity?
      • How is TNG Identity different to other identity solutions in the market?
      • Can TNG Identity communicate with other identity solutions?
      • What is TNG Identity doing with my data, and does it act as a data processor or controller?
      • What measures does TNG Identity take to protect user data?
      • What support is available for TNG Identity?
      • Can TNG Identity be integrated into our existing systems?
      • How can I get started with TNG Identity?
      • What countries is TNG Identity available in?
Powered by GitBook

Copyright © nChain Licensing AG 2024

On this page
  • Put users in command of their data.
  • Private!
  • Interoperability and security
  • What does the future look like?
  1. Privacy and Security

Privacy and Security Measures: TNG Identity Services

Put users in command of their data.

The TNG Identity Wallet React Native SDK is designed with composable feature sets, allowing you to activate only the features essential to your needs.

  • Efficiently handle Reusable verifiable credentials. Scan Verification QR Codes and present credentials for streamlined verification. Effectively create and manage Decentralised Identifiers (W3C compliant). Activate Verifier Mode to verify credentials from other users' wallets. Enhance security with the option to enable biometric authentication.

  • Data access management Users' data access is confidential and protected. TNG Identity's technology is purposefully crafted to ensure the security of user data by allowing data to remain securely in their local devices. Access is restricted by password or biometric authentication. Data is encrypted while at rest. Credentials and Verification Requests can only be decrypted by the respective DID owner. Users can create multiple DIDs, offering a versatile approach to data access management, preserving privacy and minimising correlation risks.

  • Secure Data Storage and Access Control: The secure storage of user data on local devices and password or biometric authentication encrypts data at rest. The option to back up data to trusted platforms will also be integrated. Access to credentials and verification requests is restricted to the respective DID owner, enforcing stringent access control measures.

Private!

  • Privacy enhancement Through thoughtful measures, we have significantly elevated the privacy standards within the TNG Identity ecosystem.

  • Restrict verified data to be shared. Our verification process requires the user to sign the information every time the credential is shared. If your signature is not there, the information is not valid. Even if someone duplicates your data, they can't use it in you behalf.

Interoperability and security

  • Efficient Credential Management: The efficient handling of Reusable Verifiable Credentials ensures that sensitive user information is managed seamlessly, limiting exposure during verification processes. This not only streamlines user experiences but also contributes to heightened data privacy.

  • Streamlined Verification Processes: The introduction of Verification QR Codes and the Wallet-to-Wallet verification process ensures that credential verification is conducted swiftly and securely. This streamlined approach minimises the potential exposure of user data, contributing to enhanced privacy protection.

  • DID Correlation Avoidance: Users have the flexibility to create multiple DIDs, enabling them to avoid correlation risks. This approach adds an extra layer of privacy by preventing the correlation of different user identity aspects.

What does the future look like?

  • Zero-Knowledge Proofs and Selective Disclosure: TNG Identity team is working on leveraging Zero-Knowledge Proofs and Selective Disclosure in the verification process to ensure that users can privately verify credentials without disclosing unnecessary information. This cryptographic approach adds an extra layer of privacy to the authentication process.

  • Selective Feature Activation: We are also working on implementing composable feature sets in the TNG Identity Wallet React Native SDK, allowing users to activate only the necessary features selectively. This ensures that user data is exposed only to the extent required for specific functionalities, enhancing overall privacy.

PreviousHow to share a Verifiable Credential?NextRevocation and data deletion

Last updated 9 months ago

📑